Re: [TLS] Data Volume Limits Analysis

2016-04-29 Thread Atul Luykx
Hey Martin, You're right, this analysis works for any block cipher with 128 bit output that is "good enough" (a pseudorandom permutation), and so for all versions of AES regardless of the key size. Determining the appropriate key size for the block cipher relies on accounting for possible att

Re: [TLS] Data Volume Limits Analysis

2016-04-28 Thread Martin Thomson
On 9 March 2016 at 09:16, aluykx wrote: > Kenny Paterson and I prepared a document providing an overview of how much > data ChaCha20+Poly1305 and AES-GCM can process with a single key. Besides > summarizing the results, the document also gives an explanation of why the > limits are there. The docu

Re: [TLS] Data Volume Limits Analysis

2016-03-23 Thread Aaron Zauner
* aluykx [23/03/2016 09:12:02] wrote: > >Finally, and this calls for an opinion: do you believe that given these > >results > >we should include a KeyUpdate feature in TLS 1.3? > > Ideally it would be better to include a KeyUpdate feature, but the added > complexity could risk introducing vulnera

Re: [TLS] Data Volume Limits Analysis

2016-03-23 Thread aluykx
Hey, 1. As I understand it, failure in these models is fairly catastrophic, so I should be reading Table 1 as "chance of total collapse of confidentiality", not "chance of being able to read one plaintext" value. Is that correct? Actually, confidentiality will not collapse, the limit indicate

Re: [TLS] Data Volume Limits Analysis

2016-03-20 Thread Eric Rescorla
Atul, Kenny, Thanks for doing this. My initial impression is that these results are uncomfortably close to the line for AES-GCM, especially for the scenario where we have multiple keys: there are probably well upward of 2^{32} HTTPS connections a day. A few questions: 1. As I understand it, fai

[TLS] Data Volume Limits Analysis

2016-03-08 Thread aluykx
Kenny Paterson and I prepared a document providing an overview of how much data ChaCha20+Poly1305 and AES-GCM can process with a single key. Besides summarizing the results, the document also gives an explanation of why the limits are there. The document confirms the analysis done by Watson and

Re: [TLS] Data volume limits

2016-01-05 Thread Benjamin Kaduk
On 01/04/2016 06:22 AM, Florian Weimer wrote: > On 01/04/2016 01:19 PM, Hubert Kario wrote: > >>> Dealing with this during the initial handshake is fine. But >>> supporting direction-switching after that is *really* difficult. >> yes, this is a bit more problematic, especially for one-sided transf

Re: [TLS] Data volume limits

2016-01-04 Thread Florian Weimer
On 01/04/2016 01:19 PM, Hubert Kario wrote: >> Dealing with this during the initial handshake is fine. But >> supporting direction-switching after that is *really* difficult. > > yes, this is a bit more problematic, especially for one-sided transfers. > For example, when one side is just sendin

Re: [TLS] Data volume limits

2016-01-04 Thread Hubert Kario
On Monday 04 January 2016 13:02:57 Florian Weimer wrote: > On 01/04/2016 12:59 PM, Hubert Kario wrote: > > On Monday 28 December 2015 21:08:10 Florian Weimer wrote: > >> On 12/21/2015 01:41 PM, Hubert Kario wrote: > >>> if the rekey doesn't allow the application to change > >>> authentication > >>>

Re: [TLS] Data volume limits

2016-01-04 Thread Florian Weimer
On 12/28/2015 10:09 PM, Salz, Rich wrote: >> When the key is changed, the change procedure should involve new randomness. > > I don't think this is necessary, and I don't think the common crypto > expertise agrees with you, either. But I am not a cryptographer, maybe one of > the ones on this l

Re: [TLS] Data volume limits

2016-01-04 Thread Florian Weimer
On 01/04/2016 12:59 PM, Hubert Kario wrote: > On Monday 28 December 2015 21:08:10 Florian Weimer wrote: >> On 12/21/2015 01:41 PM, Hubert Kario wrote: >>> if the rekey doesn't allow the application to change authentication >>> tokens (as it now stands), then rekey is much more secure than >>> reneg

Re: [TLS] Data volume limits

2016-01-04 Thread Hubert Kario
On Monday 28 December 2015 21:08:10 Florian Weimer wrote: > On 12/21/2015 01:41 PM, Hubert Kario wrote: > > if the rekey doesn't allow the application to change authentication > > tokens (as it now stands), then rekey is much more secure than > > renegotiation was in TLS <= 1.2 > > You still have

Re: [TLS] Data volume limits

2016-01-02 Thread James Cloos
> "ER" == Eric Rescorla writes: ER> In TLS, we use a distinct nonce for each record and then a block counter ER> inside the record. So, it's true that you couldn't encrypt a record that ER> was more than 2^{32} * 256 bits long, but since TLS records can't be ER> more than 16KB long anyway, th

Re: [TLS] Data volume limits

2016-01-01 Thread Eric Rescorla
On Fri, Jan 1, 2016 at 4:42 PM, James Cloos wrote: > > "ER" == Eric Rescorla writes: > > ER> Can you elaborate on this point a bit? I haven't been focusing on > ER> ChaCha, but we're not quite done with ChaCha yet, so if changes are > ER> needed, now would be the time. > > The switch from 64

Re: [TLS] Data volume limits

2016-01-01 Thread Watson Ladd
On Tue, Dec 29, 2015 at 2:10 PM, Brian Smith wrote: > Ilari Liusvaara wrote: >> >> OTOH, you can't drop an attacker knowing older key without doing >> new key exchange. > > > I think it would be very unfortunate to have the complexity of key update > (the new keys are derived from the old keys) w

Re: [TLS] Data volume limits

2016-01-01 Thread James Cloos
> "ER" == Eric Rescorla writes: ER> Can you elaborate on this point a bit? I haven't been focusing on ER> ChaCha, but we're not quite done with ChaCha yet, so if changes are ER> needed, now would be the time. The switch from 64 bit nonce + 64 bit counter to 96 bit nonce + 32 bit counter mean

Re: [TLS] Data volume limits

2016-01-01 Thread Ilari Liusvaara
On Fri, Jan 01, 2016 at 02:00:07PM -0500, James Cloos wrote: > [Msg for followup picked at random from this thread -JimC] > > One thing we should remember on this thread is that it does not only > apply to aes and its' 128-bit block size. > > Because TLS chose to create a NotQuiteChaCha rather th

Re: [TLS] Data volume limits

2016-01-01 Thread Eric Rescorla
On Fri, Jan 1, 2016 at 11:00 AM, James Cloos wrote: > [Msg for followup picked at random from this thread -JimC] > > One thing we should remember on this thread is that it does not only > apply to aes and its' 128-bit block size. > > Because TLS chose to create a NotQuiteChaCha rather than use Ch

Re: [TLS] Data volume limits

2016-01-01 Thread Samuel Neves
Quoting Aaron Zauner : On the other hand, after 2^60 OCB messages of 2^16 blocks (and thus 2^76 total blocks), a block collision is almost guaranteed to have happened, enabling the aforementioned forgeries. Sure. Would you see any way to improve this situation in the draft, i.e. give implement

Re: [TLS] Data volume limits

2016-01-01 Thread James Cloos
[Msg for followup picked at random from this thread -JimC] One thing we should remember on this thread is that it does not only apply to aes and its' 128-bit block size. Because TLS chose to create a NotQuiteChaCha rather than use ChaCha, its chacha20poly1305 also has a small data volume limit (2

Re: [TLS] Data volume limits

2016-01-01 Thread Aaron Zauner
Hi, * sne...@dei.uc.pt [01/01/2016 18:19:26] wrote: > The contention with GCM in this thread has been, so far, focused on > confidentiality. This is because, by a result of Bernstein [1] (see also > Appendix C of [2]), after q = 2^60 messages sent, plus q' = 2^60 attempted > forgeries by an attac

Re: [TLS] Data volume limits

2016-01-01 Thread sneves
Quoting Aaron Zauner : * Samuel Neves [01/01/2016 12:19:36] wrote: OCB is, if anything, worse than GCM when it comes to data volume limits. It has the same confidentiality bounds as GCM (slightly worse, in fact), but once you hit a collision you also lose authenticity and enable simple forg

Re: [TLS] Data volume limits

2016-01-01 Thread Aaron Zauner
Hi Samuel, * Samuel Neves [01/01/2016 12:19:36] wrote: > OCB is, if anything, worse than GCM when it comes to data volume limits. It > has the same confidentiality bounds as GCM > (slightly worse, in fact), but once you hit a collision you also lose > authenticity and enable simple forgeries [1

Re: [TLS] Data volume limits

2016-01-01 Thread Ilari Liusvaara
On Fri, Jan 01, 2016 at 01:54:00PM +0100, Henrick Wibell Hellström wrote: > I think it is a good idea to rekey AES-GCM after approximately 2^32 records, > give or take a few magnitudes. > > The question for me isn't whether AES-GCM requires frequent rekeying (it > does), but exactly how much compl

Re: [TLS] Data volume limits

2016-01-01 Thread Henrick Wibell Hellström
I think it is a good idea to rekey AES-GCM after approximately 2^32 records, give or take a few magnitudes. The question for me isn't whether AES-GCM requires frequent rekeying (it does), but exactly how much complexity the rekeying mechanism would add, to the protocol and to implementations.

Re: [TLS] Data volume limits

2016-01-01 Thread Samuel Neves
On 01/01/2016 06:35 AM, Aaron Zauner wrote: > This might be a good time to point again to my existing AES-OCB > draft that hasn't really seen a lot of discussion nor love lately. > It expired but I've recently updated the draft (not yet uploaded > to IETF as I'm waiting for implementer feedback fro

Re: [TLS] Data volume limits

2015-12-31 Thread Ilari Liusvaara
On Fri, Jan 01, 2016 at 08:04:11AM +0100, Aaron Zauner wrote: > * Aaron Zauner [01/01/2016 07:35:26] wrote: > > This might be a good time to point again to my existing AES-OCB > > draft that hasn't really seen a lot of discussion nor love lately. > > It expired but I've recently updated the draft

Re: [TLS] Data volume limits

2015-12-31 Thread Aaron Zauner
* Aaron Zauner [01/01/2016 07:35:26] wrote: > This might be a good time to point again to my existing AES-OCB > draft that hasn't really seen a lot of discussion nor love lately. > It expired but I've recently updated the draft (not yet uploaded > to IETF as I'm waiting for implementer feedback fr

Re: [TLS] Data volume limits

2015-12-31 Thread Aaron Zauner
Hi, * Simon Josefsson [16/12/2015 09:44:55] wrote: > I don't like re-keying. It is usually a sign that your primitives are > too weak and you are attempting to hide that fact. To me, it is similar > to discard the first X byte of RC4 output. > > If AES-GCM cannot provide confidentiality beyond

Re: [TLS] Data volume limits

2015-12-29 Thread Blumenthal, Uri - 0553 - MITLL
I like option (2) from Eric's taxonomy. Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network. From: Eric Rescorla Sent: Tuesday, December 29, 2015 18:12 To: Dave Garrett Cc: Florian Weimer; tls@ietf.org Subject: Re: [TLS] Data volume limits On Tue, Dec 29, 2015 at

Re: [TLS] Data volume limits

2015-12-29 Thread Eric Rescorla
On Tue, Dec 29, 2015 at 5:08 PM, Dave Garrett wrote: > On Tuesday, December 29, 2015 02:10:25 pm Brian Smith wrote: > > Note that NIST Special Publication 800-133 [1] defines these separate > > terms, and I suggest we use them in this conversation to avoid confusion: > > > > Key update: A procedu

Re: [TLS] Data volume limits

2015-12-29 Thread Dave Garrett
On Tuesday, December 29, 2015 02:10:25 pm Brian Smith wrote: > Note that NIST Special Publication 800-133 [1] defines these separate > terms, and I suggest we use them in this conversation to avoid confusion: > > Key update: A procedure in which a new cryptographic key is computed as a > function

Re: [TLS] Data volume limits

2015-12-29 Thread Eric Rescorla
On Tue, Dec 29, 2015 at 2:10 PM, Brian Smith wrote: > Ilari Liusvaara wrote: > >> OTOH, you can't drop an attacker knowing older key without doing >> new key exchange. >> > > I think it would be very unfortunate to have the complexity of key update > (the new keys are derived from the old keys)

Re: [TLS] Data volume limits

2015-12-29 Thread Brian Smith
Ilari Liusvaara wrote: > OTOH, you can't drop an attacker knowing older key without doing > new key exchange. > I think it would be very unfortunate to have the complexity of key update (the new keys are derived from the old keys) without having the benefits of rekeying (the new keys are indepen

Re: [TLS] Data volume limits

2015-12-29 Thread Dang, Quynh
. From: TLS on behalf of Dang, Quynh Sent: Friday, December 18, 2015 10:49 AM To: tls@ietf.org Subject: Re: [TLS] Data volume limits The collision probability of ciphertext blocks also depends on the size of the plaintext (record size in a TLS

Re: [TLS] Data volume limits

2015-12-28 Thread Blumenthal, Uri - 0553 - MITLL
Blumenthal, Uri - 0553 - MITLL; Eric Rescorla Cc: Florian Weimer; tls@ietf.org Subject: RE: [TLS] Data volume limits > When the key is changed, the change procedure should involve new randomness.  ‎ I don't think this is necessary, and I don't think the common crypto expertise agrees

Re: [TLS] Data volume limits

2015-12-28 Thread Salz, Rich
> When the key is changed, the change procedure should involve new randomness.  I don't think this is necessary, and I don't think the common crypto expertise agrees with you, either. But I am not a cryptographer, maybe one of the ones on this list can chime in. "Crank the KDF" suffices.

Re: [TLS] Data volume limits

2015-12-28 Thread Ilari Liusvaara
On Mon, Dec 28, 2015 at 08:51:01PM +, Blumenthal, Uri - 0553 - MITLL wrote: > When too much plaintext has been encrypted with the same key, the > key needs to be changed. When the key is changed, the change > procedure should involve new randomness.  > > What's the confusion here??? OTOH, you

Re: [TLS] Data volume limits

2015-12-28 Thread Blumenthal, Uri - 0553 - MITLL
Eric Rescorla Sent: Monday, December 28, 2015 15:47 To: Blumenthal, Uri - 0553 - MITLL Cc: Florian Weimer; tls@ietf.org Subject: Re: [TLS] Data volume limits To be clear, the concern that we are trying to alleviate is encrypting too much plaintext with the same key (see the discussion by Watson a

Re: [TLS] Data volume limits

2015-12-28 Thread Eric Rescorla
; > > Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network. > *From: *Eric Rescorla > *Sent: *Monday, December 28, 2015 15:37 > *To: *Florian Weimer > *Cc: *tls@ietf.org > *Subject: *Re: [TLS] Data volume limits > > > > On Mon, Dec 28, 2015 at 3:

Re: [TLS] Data volume limits

2015-12-28 Thread Blumenthal, Uri - 0553 - MITLL
Off-hand, key update or re-key without new/fresh‎ randomness sounds weird. Sent from my BlackBerry 10 smartphone on the Verizon Wireless 4G LTE network. From: Eric Rescorla Sent: Monday, December 28, 2015 15:37 To: Florian Weimer Cc: tls@ietf.org Subject: Re: [TLS] Data volume limits On Mon

Re: [TLS] Data volume limits

2015-12-28 Thread Eric Rescorla
On Mon, Dec 28, 2015 at 3:33 PM, Florian Weimer wrote: > On 12/28/2015 09:11 PM, Eric Rescorla wrote: > > >> You still have the added complexity that during rekey, you need to > >> temporarily switch from mere sending or receiving to at least > >> half-duplex interaction. > >> > > > > That's not

Re: [TLS] Data volume limits

2015-12-28 Thread Florian Weimer
On 12/28/2015 09:11 PM, Eric Rescorla wrote: >> You still have the added complexity that during rekey, you need to >> temporarily switch from mere sending or receiving to at least >> half-duplex interaction. >> > > That's not intended. Indeed, you need to be able to handle the old key > in order

Re: [TLS] Data volume limits

2015-12-28 Thread Eric Rescorla
On Mon, Dec 28, 2015 at 3:08 PM, Florian Weimer wrote: > On 12/21/2015 01:41 PM, Hubert Kario wrote: > > > if the rekey doesn't allow the application to change authentication > > tokens (as it now stands), then rekey is much more secure than > > renegotiation was in TLS <= 1.2 > > You still have

Re: [TLS] Data volume limits

2015-12-28 Thread Florian Weimer
On 12/21/2015 01:41 PM, Hubert Kario wrote: > if the rekey doesn't allow the application to change authentication > tokens (as it now stands), then rekey is much more secure than > renegotiation was in TLS <= 1.2 You still have the added complexity that during rekey, you need to temporarily swi

Re: [TLS] Data volume limits

2015-12-28 Thread Eric Rescorla
Scott, Henrick, Are you persuaded by Watson's analysis? Thanks, -Ekr On Mon, Dec 21, 2015 at 7:41 AM, Hubert Kario wrote: > On Tuesday 15 December 2015 20:01:58 Bill Frantz wrote: > > So we have to trade off the risks of too much data vs. the risks > > of a complex rekey protocol vs. the ri

Re: [TLS] Data volume limits

2015-12-21 Thread Hubert Kario
On Tuesday 15 December 2015 20:01:58 Bill Frantz wrote: > So we have to trade off the risks of too much data vs. the risks > of a complex rekey protocol vs. the risks having the big data > applications build new connections every 2**36 or so bytes. > > If we don't have rekeying, then the big data

Re: [TLS] Data volume limits

2015-12-18 Thread Dang, Quynh
d IND-* property, the above restriction is not needed. Quynh. From: TLS on behalf of Yoav Nir Sent: Thursday, December 17, 2015 6:07 AM To: Nikos Mavrogiannopoulos Cc: tls@ietf.org; Simon Josefsson Subject: Re: [TLS] Data volume limits > On 17 Dec 2015, at

Re: [TLS] Data volume limits

2015-12-17 Thread Yoav Nir
> On 17 Dec 2015, at 10:19 AM, Nikos Mavrogiannopoulos wrote: > > On Wed, 2015-12-16 at 09:57 -1000, Brian Smith wrote: > >> Therefore, I think we shouldn't add the rekeying mechanism as it is >> unnecessary and it adds too much complexity. > > Any arbitrary limit for a TLS connection is almo

Re: [TLS] Data volume limits

2015-12-17 Thread Nikos Mavrogiannopoulos
On Wed, 2015-12-16 at 09:57 -1000, Brian Smith wrote: > Therefore, I think we shouldn't add the rekeying mechanism as it is > unnecessary and it adds too much complexity. Any arbitrary limit for a TLS connection is almost guaranteed to cause problems in the future. We cannot predict whether 2^x

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
On Dec 16, 2015 5:26 PM, "Brian Smith" wrote: > > Watson Ladd wrote: > >> Brian Smith wrote: >> > So, if [2] is correct, then we can take Watson's 2^36 and multiply it by >> > 2^17 to get 2^53 bytes as the limit? It seems so, since [2] claims that >> > they've improved the bounds by 2^17. Note t

Re: [TLS] Data volume limits

2015-12-16 Thread Brian Smith
Watson Ladd wrote: > Brian Smith wrote: > > So, if [2] is correct, then we can take Watson's 2^36 and multiply it by > > 2^17 to get 2^53 bytes as the limit? It seems so, since [2] claims that > > they've improved the bounds by 2^17. Note that 3 out of 4 of the authors > of > > [2] are the same

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
On Wed, Dec 16, 2015 at 2:57 PM, Brian Smith wrote: > Eric Rescorla wrote: >> >> >> I believe Watson provided one a while back at: >> https://www.ietf.org/mail-archive/web/tls/current/msg18240.html > > > So, if [2] is correct, then we can take Watson's 2^36 and multiply it by > 2^17 to get 2^53 b

Re: [TLS] Data volume limits

2015-12-16 Thread Brian Smith
Eric Rescorla wrote: > > I believe Watson provided one a while back at: > https://www.ietf.org/mail-archive/web/tls/current/msg18240.html > So, if [2] is correct, then we can take Watson's 2^36 and multiply it by 2^17 to get 2^53 bytes as the limit? It seems so, since [2] claims that they've imp

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
On Wed, Dec 16, 2015 at 1:14 PM, Blumenthal, Uri - 0553 - MITLL wrote: > On 12/16/15, 12:16 , "Watson Ladd" wrote: > >>On Wed, Dec 16, 2015 at 12:09 PM, Blumenthal, Uri - 0553 - MITLL >> wrote: >>> On 12/16/15, 10:50, "Watson Ladd" wrote: >If there are practical consequences, like loss of co

Re: [TLS] Data volume limits

2015-12-16 Thread Blumenthal, Uri - 0553 - MITLL
On 12/16/15, 12:16 , "Watson Ladd" wrote: >On Wed, Dec 16, 2015 at 12:09 PM, Blumenthal, Uri - 0553 - MITLL > wrote: >> On 12/16/15, 10:50, "Watson Ladd" wrote: If there are practical consequences, like loss of confidentiality – I’m dying to hear the outline of a practical attack. >>> >

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
unds, but a mode limitation. Since you've agreed we can rekey more frequently > > >>>From: TLS on behalf of "Dang, Quynh" >>> >>> Date: Wednesday, December 16, 2015 at 07:21 >>> To: Eric Rescorla , "tls@ietf.org" >>> >&g

Re: [TLS] Data volume limits

2015-12-16 Thread Blumenthal, Uri - 0553 - MITLL
attack. >>From: TLS on behalf of "Dang, Quynh" >> >> Date: Wednesday, December 16, 2015 at 07:21 >> To: Eric Rescorla , "tls@ietf.org" >> >> Subject: Re: [TLS] Data volume limits >> >> Hi Eric, >> >> >> I

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
like 128 GByte per connection? > -- > Regards, > Uri Blumenthal > > From: TLS on behalf of "Dang, Quynh" > > Date: Wednesday, December 16, 2015 at 07:21 > To: Eric Rescorla , "tls@ietf.org" > > Subject: Re: [TLS] Data volume limits > > Hi Eric, > >

Re: [TLS] Data volume limits

2015-12-16 Thread Blumenthal, Uri - 0553 - MITLL
gt; on behalf of "Dang, Quynh" mailto:quynh.d...@nist.gov>> Date: Wednesday, December 16, 2015 at 07:21 To: Eric Rescorla mailto:e...@rtfm.com>>, "tls@ietf.org<mailto:tls@ietf.org>" mailto:tls@ietf.org>> Subject: Re: [TLS] Data volume limits Hi E

Re: [TLS] Data volume limits

2015-12-16 Thread Dang, Quynh
f.org Subject: Re: [TLS] Data volume limits On Wed, Dec 16, 2015 at 12:44 AM, Simon Josefsson mailto:si...@josefsson.org>> wrote: Eric Rescorla mailto:e...@rtfm.com>> writes: > Watson kindly prepared some text that described the limits on what's safe > for AES-GCM and restric

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
On Wed, Dec 16, 2015 at 7:07 AM, Henrick Hellström wrote: > On 2015-12-16 12:17, Eric Rescorla wrote: >> >> Can we see a brief writeup explaining the 2^36 number? >> >> >> I believe Watson provided one a while back at: >> https://www.ietf.org/mail-archive/web/tls/current/msg18240.html > > > On

Re: [TLS] Data volume limits

2015-12-16 Thread Watson Ladd
On Wed, Dec 16, 2015 at 6:17 AM, Eric Rescorla wrote: > > > On Wed, Dec 16, 2015 at 12:44 AM, Simon Josefsson > wrote: >> >> Eric Rescorla writes: >> >> > Watson kindly prepared some text that described the limits on what's >> > safe >> > for AES-GCM and restricting all algorithms with TLS 1.3 t

Re: [TLS] Data volume limits

2015-12-16 Thread Henrick Hellström
On 2015-12-16 12:17, Eric Rescorla wrote: Can we see a brief writeup explaining the 2^36 number? I believe Watson provided one a while back at: https://www.ietf.org/mail-archive/web/tls/current/msg18240.html One rather obvious problem with trying to equate probability of loss of confiden

Re: [TLS] Data volume limits

2015-12-16 Thread Eric Rescorla
On Wed, Dec 16, 2015 at 12:44 AM, Simon Josefsson wrote: > Eric Rescorla writes: > > > Watson kindly prepared some text that described the limits on what's safe > > for AES-GCM and restricting all algorithms with TLS 1.3 to that lower > > limit (2^{36} bytes), even though ChaCha doesn't have the

Re: [TLS] Data volume limits

2015-12-16 Thread Simon Josefsson
Eric Rescorla writes: > Watson kindly prepared some text that described the limits on what's safe > for AES-GCM and restricting all algorithms with TLS 1.3 to that lower > limit (2^{36} bytes), even though ChaCha doesn't have the same > restriction. Can we see a brief writeup explaining the 2^36

Re: [TLS] Data volume limits

2015-12-15 Thread Paterson, Kenny
RC4 does not rekey per application layer fragment in TLS. The same key is used for the duration of a connection. Other protocols using RC4 do rekey per packet, eg WEP and WPA/TKIP. Cheers Kenny > On 16 Dec 2015, at 16:37, Ryan Carboni wrote: > > How often does TLS rekey anyway? I know RC4

Re: [TLS] Data volume limits

2015-12-15 Thread Ryan Carboni
How often does TLS rekey anyway? I know RC4 rekeys per packet, but I've read and searched a fair amount of documentation, and haven't found anything on the subject. Perhaps I'm looking for the wrong terms or through the wrong documents. ___ TLS mailing li

Re: [TLS] Data volume limits

2015-12-15 Thread Andrey Jivsov
t;] > > Sent: Tuesday, December 15, 2015 5:38 PM > > To: Scott Fluhrer (sfluhrer) > > Cc: Eric Rescorla; tls@ietf.org <mailto:tls@ietf.org> > > Subject: Re: [TLS] Data volume limits > > > > On Tue, Dec 15, 2015 at 5:01 PM, Scott Fluhrer (sfluhrer) > >

Re: [TLS] Data volume limits

2015-12-15 Thread Dave Garrett
On Tuesday, December 15, 2015 11:11:36 pm Martin Thomson wrote: > On 16 December 2015 at 15:08, Dave Garrett wrote: > > We could just make the threshold a configurable parameter, with > > default/maximum at 2^32 bytes. Each endpoint could just provide its > > threshold in a new extension. Both g

Re: [TLS] Data volume limits

2015-12-15 Thread Martin Thomson
On 16 December 2015 at 15:08, Dave Garrett wrote: > We could just make the threshold a configurable parameter, with > default/maximum at 2^32 bytes. Each endpoint could just provide its threshold > in a new extension. Both get to specify what they want and it could be > lowered arbitrarily for

Re: [TLS] Data volume limits

2015-12-15 Thread Dave Garrett
On Tuesday, December 15, 2015 10:59:35 pm Martin Thomson wrote: > On 16 December 2015 at 14:57, Dave Garrett wrote: > > In fact, if we're OK with setting this rather low threshold, then we could > > even get rid of the rekey signal entirely and just have an automatic rekey > > after every 4GiB f

Re: [TLS] Data volume limits

2015-12-15 Thread Eric Rescorla
On Tue, Dec 15, 2015 at 7:59 PM, Martin Thomson wrote: > On 16 December 2015 at 14:57, Dave Garrett wrote: > > In fact, if we're OK with setting this rather low threshold, then we > could even get rid of the rekey signal entirely and just have an automatic > rekey after every 4GiB for all cipher

Re: [TLS] Data volume limits

2015-12-15 Thread Bill Frantz
So we have to trade off the risks of too much data vs. the risks of a complex rekey protocol vs. the risks having the big data applications build new connections every 2**36 or so bytes. If we don't have rekeying, then the big data applications are the only ones at risk. If we do, it may be a

Re: [TLS] Data volume limits

2015-12-15 Thread Martin Thomson
On 16 December 2015 at 14:57, Dave Garrett wrote: > In fact, if we're OK with setting this rather low threshold, then we could > even get rid of the rekey signal entirely and just have an automatic rekey > after every 4GiB for all ciphers. That'd be one less complexity to deal with. > Rekeys wo

Re: [TLS] Data volume limits

2015-12-15 Thread Dave Garrett
On Tuesday, December 15, 2015 09:40:41 pm Martin Thomson wrote: > In light of that, the actual limits don't matter that much to me. As > David McGrew suggested, set a limit at 2^32 and avoid having to think > too hard about how close to the failure point you might be. +1 In fact, if we're OK wit

Re: [TLS] Data volume limits

2015-12-15 Thread Stephen Farrell
Hi Watson, On 16/12/15 03:36, Watson Ladd wrote: > The problem is that once you stack enough of those negligible > probabilities together, you end up with something big. Push up to > 2^{63} bytes, and the collision probability is 1/4 or 1/2 (I didn't > recompute it just now). The collision prob

Re: [TLS] Data volume limits

2015-12-15 Thread Watson Ladd
On Tue, Dec 15, 2015 at 7:59 PM, Henrick Hellström wrote: > On 2015-12-16 01:31, Watson Ladd wrote: >> >> You don't understand the issue. The issue is PRP not colliding, whereas >> PRF can. > > > Oh, but I concur. This means that if you observe two same valued cipher text > blocks, you know that t

Re: [TLS] Data volume limits

2015-12-15 Thread Eric Rescorla
On Tue, Dec 15, 2015 at 4:59 PM, Henrick Hellström wrote: > On 2015-12-16 01:31, Watson Ladd wrote: > >> You don't understand the issue. The issue is PRP not colliding, whereas >> PRF can. >> > > Oh, but I concur. This means that if you observe two same valued cipher > text blocks, you know that

Re: [TLS] Data volume limits

2015-12-15 Thread Martin Thomson
On 16 December 2015 at 14:01, Brian Smith wrote: > Martin Thomson wrote: > Why? If there were a stupidly high limit, then I would argue for no rekeying facility. But the numbers Watson ran suggested that GCM starts to look shaky at 2^36. That's too low for some applications. For the rest of t

Re: [TLS] Data volume limits

2015-12-15 Thread Brian Smith
Martin Thomson wrote: > Whatever the actual limits are, I think that implementatios should be > encouraged to rekey more strongly. > Why? > And suggesting a stupidly high limit (e.g., ChaCha being > greater than 2^96) leaves people thinking that they can skip > implementation and testing of th

Re: [TLS] Data volume limits

2015-12-15 Thread Martin Thomson
On 16 December 2015 at 08:14, Eric Rescorla wrote: > > I wanted to get people's opinions on whether that's actually what we want > or whether we should (as is my instinct) allow people to use ChaCha > for longer periods. Whatever the actual limits are, I think that implementatios should be encou

Re: [TLS] Data volume limits

2015-12-15 Thread Henrick Hellström
On 2015-12-16 01:31, Watson Ladd wrote: You don't understand the issue. The issue is PRP not colliding, whereas PRF can. Oh, but I concur. This means that if you observe two same valued cipher text blocks, you know that the corresponding key stream blocks can't be identical, and deduce that t

Re: [TLS] Data volume limits

2015-12-15 Thread Scott Fluhrer (sfluhrer)
> -Original Message- > From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Henrick Hellström > Sent: Tuesday, December 15, 2015 7:09 PM > To: tls@ietf.org > Subject: Re: [TLS] Data volume limits > > On 2015-12-16 00:48, Eric Rescorla wrote: > > > > &g

Re: [TLS] Data volume limits

2015-12-15 Thread Andrey Jivsov
On 12/15/2015 04:08 PM, Henrick Hellström wrote: > On 2015-12-16 00:48, Eric Rescorla wrote: >> >> >> On Tue, Dec 15, 2015 at 3:08 PM, Scott Fluhrer (sfluhrer) >> mailto:sfluh...@cisco.com>> wrote: >> The quadratic behavior in the security proofs are there for just >> about any block ciph

Re: [TLS] Data volume limits

2015-12-15 Thread Watson Ladd
On Dec 15, 2015 7:09 PM, "Henrick Hellström" wrote: > > On 2015-12-16 00:48, Eric Rescorla wrote: >> >> >> >> On Tue, Dec 15, 2015 at 3:08 PM, Scott Fluhrer (sfluhrer) >> mailto:sfluh...@cisco.com>> wrote: >> The quadratic behavior in the security proofs are there for just >> about any blo

Re: [TLS] Data volume limits

2015-12-15 Thread Henrick Hellström
On 2015-12-16 00:48, Eric Rescorla wrote: On Tue, Dec 15, 2015 at 3:08 PM, Scott Fluhrer (sfluhrer) mailto:sfluh...@cisco.com>> wrote: The quadratic behavior in the security proofs are there for just about any block cipher mode, and is the reason why you want to stay well below the

Re: [TLS] Data volume limits

2015-12-15 Thread Brian Smith
Watson Ladd wrote: > The issue is the bounds in Iwata-Ohashai-Minematsu's paper, which show > a quadratic confidentiality loss after a total volume sent. This is an > exploitable issue. > Please explain in more detail how you got "2^36 bytes" for a nonce size of 96 bits from the Iwata-Ohashai-Mi

Re: [TLS] Data volume limits

2015-12-15 Thread Eric Rescorla
> > Cc: Eric Rescorla; tls@ietf.org > > Subject: Re: [TLS] Data volume limits > > > > On Tue, Dec 15, 2015 at 5:01 PM, Scott Fluhrer (sfluhrer) > > wrote: > > > Might I enquire about the cryptographical reason behind such a limit? > > > > > &g

Re: [TLS] Data volume limits

2015-12-15 Thread Watson Ladd
On Dec 15, 2015 6:08 PM, "Scott Fluhrer (sfluhrer)" wrote: > > > > > -Original Message- > > From: Watson Ladd [mailto:watsonbl...@gmail.com] > > Sent: Tuesday, December 15, 2015 5:38 PM > > To: Scott Fluhrer (sfluhrer) > > Cc: Eric Rescorla

Re: [TLS] Data volume limits

2015-12-15 Thread Scott Fluhrer (sfluhrer)
> -Original Message- > From: Watson Ladd [mailto:watsonbl...@gmail.com] > Sent: Tuesday, December 15, 2015 5:38 PM > To: Scott Fluhrer (sfluhrer) > Cc: Eric Rescorla; tls@ietf.org > Subject: Re: [TLS] Data volume limits > > On Tue, Dec 15, 2015 at 5:01 PM,

Re: [TLS] Data volume limits

2015-12-15 Thread Watson Ladd
mailto:tls-boun...@ietf.org] On Behalf Of Eric Rescorla > Sent: Tuesday, December 15, 2015 4:15 PM > To: tls@ietf.org > Subject: [TLS] Data volume limits > > > > Watson kindly prepared some text that described the limits on what's safe > > for AES-GCM and restricting all a

Re: [TLS] Data volume limits

2015-12-15 Thread Hanno Böck
On Tue, 15 Dec 2015 13:14:30 -0800 Eric Rescorla wrote: > Watson kindly prepared some text that described the limits on what's > safe for AES-GCM and restricting all algorithms with TLS 1.3 to that > lower limit (2^{36} bytes), even though ChaCha doesn't have the same > restriction. > > I wanted

Re: [TLS] Data volume limits

2015-12-15 Thread Watson Ladd
On Tue, Dec 15, 2015 at 5:18 PM, Russ Housley wrote: > > On Dec 15, 2015, at 4:14 PM, Eric Rescorla wrote: > >> Watson kindly prepared some text that described the limits on what's safe >> for AES-GCM and restricting all algorithms with TLS 1.3 to that lower >> limit (2^{36} bytes), even though Ch

Re: [TLS] Data volume limits

2015-12-15 Thread Russ Housley
On Dec 15, 2015, at 4:14 PM, Eric Rescorla wrote: > Watson kindly prepared some text that described the limits on what's safe > for AES-GCM and restricting all algorithms with TLS 1.3 to that lower > limit (2^{36} bytes), even though ChaCha doesn't have the same > restriction. > > I wanted to ge

Re: [TLS] Data volume limits

2015-12-15 Thread Eric Rescorla
On Behalf Of *Eric Rescorla > *Sent:* Tuesday, December 15, 2015 4:15 PM > *To:* tls@ietf.org > *Subject:* [TLS] Data volume limits > > > > Watson kindly prepared some text that described the limits on what's safe > > for AES-GCM and restricting all algorithms with TLS

Re: [TLS] Data volume limits

2015-12-15 Thread Scott Fluhrer (sfluhrer)
Eric Rescorla Sent: Tuesday, December 15, 2015 4:15 PM To: tls@ietf.org Subject: [TLS] Data volume limits Watson kindly prepared some text that described the limits on what's safe for AES-GCM and restricting all algorithms with TLS 1.3 to that lower limit (2^{36} bytes), even though ChaCha do

Re: [TLS] Data volume limits

2015-12-15 Thread Benjamin Beurdouche
> On 15 Dec 2015, at 22:17, Watson Ladd wrote: > > I don't think that's what I intended: I think the limit should be > ciphersuite specific. Unfortunately that requires more work. > > On Tue, Dec 15, 2015 at 4:15 PM, Eric Rescorla wrote: >> >>> I wanted to get people's opinions on whether tha

Re: [TLS] Data volume limits

2015-12-15 Thread Dave Garrett
Personally, I think a hard requirement to rekey every 64GiB is reasonable enough to just use it for every cipher. I don't think cipher-specific requirements are worth the effort/complexity. Something like a MUST for AES-GCM and a SHOULD for ChaCha seems fine, though, if really desired. Dave

Re: [TLS] Data volume limits

2015-12-15 Thread Eric Rescorla
On Tue, Dec 15, 2015 at 1:17 PM, Watson Ladd wrote: > I don't think that's what I intended: I think the limit should be > ciphersuite specific. Unfortunately that requires more work. > That makes sense. Do you think you'll be able to provide that in the not too distant future? I can just leave t

  1   2   >